Start Guide#

User account#

Once your company is registered in CROC Cloud, a notification is sent to your corporate e-mail, containing an admin account password and login in the admin@<customer> format, where customer is the company ID specified at the registration. This account has the required privileges to register new users and company projects.

Attention

For security reasons, it is strongly recommended to use the admin account, which is provided at the company registration, only when working in the IAM section. For other cloud services, create and use additional accounts without administrative privileges.

Note

We will lock the account being inactive for more than 45 days. Contact your company administrator if you try to log in and see a message that your account has been locked.

System user#

A system user system@<customer> is created, along with the account, and granted necessary project privileges to perform service functions, when the project is created. The system user prepares and maintains cloud resources required for normal operation of services, such as Auto Scaling, Kubernetes and PaaS. The system user has no access to user data, and operations it performs are logged in the Activity Log.

Authorization in CROC Cloud#

When you first sign in, enter your username and password. After successful login to CROC Cloud, you will be asked to change your password.

Attention

Password requirements:

  • Password must contain at least 8 characters.

  • The new password must not be the same as the login.

  • The password must contain at least one Latin letter in upper and lower cases, a digit and a special character.

  • The password must be an irregular combination of characters: it must not contain easy-to-guess words, consecutive letters and numbers, repeating character combinations, be similar to an email address, etc.

  • The new password must not be the same as the previous five passwords.

In addition, we recommend that you change your password at least every 60 days and follow common practices for handling passwords, in particular, avoid storing your password in the clear text format.

To protect your profile, set a strong password yourself or generate it by clicking Generate password. Follow the on-screen instructions, click Change Password. Use new password to operate with CROC Cloud.

Attention

If you enter a wrong password for four times, the account is locked for 15 minutes. With repeated unsuccessful attempts, the locking interval may increase up to 60 minutes.

Configuring account, notifications and API access#

To modify your account settings, manage an access to API and manage notifications click the username in the top right corner of the screen and select Profile.

Changing your personal data and notification settings#

You can change your personal data in the profile settings. Modify corresponding fields to change the name, email address, and phone number.

In this section, using switches, you can manage your email notification subscriptions.

Two-factor authentication#

Use two-factor authentication to provide additional security for your account. You need to have an access to a tablet or smartphone with a two-factor authentication app installed.

Click Set up 2FA to enable two-factor authentication. Then open two-factor authentication app installed on your smartphone or tablet (e.g. Google Authenticator) and add your account by scanning QR code. In the setting OTP secret dialog window enter the password generated by the app and click Apply.

Attention

The device with the app installed must use the time and time zone of the network.

From this moment, at each logging in to CROC Cloud you will have to enter one-time passwords generated by two-factor authentication app on your device.

To return to single-factor authentication, click Disable 2FA and confirm the action.

Receiving API access settings#

To receive settings for API access in .sh format, click Get API access settings.

Changing API secret#

To change API secret, click Change API key.

Attention

After the key is changed, you will have to reconfigure all external applications.

CROC Cloud web interface#

Sign in, using the username and password of your account.

Supported browsers#

To use the web interface, we recommend the following browsers:

  • Chrome v.90 or later;

  • Firefox v.89 or later;

  • Opera v.76 or later;

  • Safari 14 or later version;

  • Edge v.90 or later.

Available features#

Depending on the user’s role in the CROC Cloud, you can see different sections and functions:

  1. Management console – basic operations with instances, volumes, and networks.

  2. Object storage – operations with cloud object storage.

  3. Monitoring — monitors your CROC Cloud resources in real time.

  4. Activity log – user activity logging and analysis.

  5. Kubernetes clusters – container orchestration tool provided as a CROC Cloud service.

  6. PaaS – automated database service for quick deployment of standalone or clustered DBMSs.

  7. IAM - users, projects, roles and notifications management.

  8. Billing - cost control and detailing.

Use drop-down lists under the navigation menu to easily switch between projects.

Instance launch#

To launch an instance, navigate to Virtual machines Compute Instances section and click Create. In the opening dialog box, select one of the pre-built images and click Select.

At the next step, specify key instance parameters:

Parameter

Documentation

Documentation

Instance name

Number of instances

Number of instances of this type to create (1 by default)

Instance type

Instance computing resources selection

Virtualization type

hvm | hvm-legacy

SSH key

If public SSH keys are added to the project, you can select one of them

Subnet

Subnet in which the instance will be located

Private address

Instance private address

Placement group

The distribution of instances on different compute nodes helps to minimize the number of affected instances in the event of failure of one of physical compute nodes

Availability Zone

Selection of avaiability zone in which instance will be allocated

Security groups

Ability to assign to the instance security groups created in VPC (up to 5 groups). If you do not specify security group while starting the instance, then the default security group will be assigned to the instance

Switches

Ability to attach virtual switches to an instance (only L2 connectivity is enabled)

Assign a public address

Associate public IP address to obtain access from the Internet after the instance launch. Public IP address should be allocated in advance in Addresses section

Terminate on instance shutdown

Specifies whether the instance should automatically be terminated after the shutdown

User data

Data describing operations that are automatically executed on instance creating

After all necessary parameters are set, click Next.

A dialog window will open where you can change or attach additional volumes to the instance.

After all necessary parameters are set, click Launch new instance button.

Instance start may take some time. Upon instance launch process completion, the instance status will change to running. Each instance gets a unique ID in i-xxxxxx form. Anytime you can change some instance parameters, attach or detach volumes, reboot or stop the instance, change public address, etc.